CN106937406A - A kind of method and system for accessing wireless network - Google Patents

A kind of method and system for accessing wireless network Download PDF

Info

Publication number
CN106937406A
CN106937406A CN201710221072.2A CN201710221072A CN106937406A CN 106937406 A CN106937406 A CN 106937406A CN 201710221072 A CN201710221072 A CN 201710221072A CN 106937406 A CN106937406 A CN 106937406A
Authority
CN
China
Prior art keywords
node device
controller
temporary key
wireless network
verification value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710221072.2A
Other languages
Chinese (zh)
Other versions
CN106937406B (en
Inventor
陈�峰
邓迅升
陈博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SHENDIE SEMICONDUCTOR CO Ltd
Original Assignee
SHENZHEN SHENDIE SEMICONDUCTOR CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SHENDIE SEMICONDUCTOR CO Ltd filed Critical SHENZHEN SHENDIE SEMICONDUCTOR CO Ltd
Priority to CN201710221072.2A priority Critical patent/CN106937406B/en
Publication of CN106937406A publication Critical patent/CN106937406A/en
Application granted granted Critical
Publication of CN106937406B publication Critical patent/CN106937406B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and system for accessing wireless network, wherein, the method for accessing wireless network carries out pairing feature and exchanges by controller and node device;Prompting user is input into the temporary key produced by the on-off times of control node equipment on the controller;The temporary key according to user input carries out matching checking afterwards, and generates ephemeral keys according to the temporary key after being proved to be successful;The encryption connection set up between controller and node device according to the ephemeral keys afterwards, complete encryption data interaction, temporary key is produced by the on-off times of control node equipment, the production costs such as Quick Response Code or bar code need not be increased, and temporary key randomness is strong, effectively increase the security of data interaction between smart machine in wireless network.

Description

A kind of method and system for accessing wireless network
Technical field
The present invention relates to radio network technique field, more particularly to a kind of method and system for accessing wireless network.
Background technology
In the wireless network during the pairing of equipment, when the temporary key of foreseeable or easy determination(TK)Value is made Used time, no matching method provides protection in order to avoid being eavesdropped during pairing.In traditional technical scheme, typically In process of production for smart machine distributes unique temporary key or identical temporary key, and it is stored in smart machine; After user buys the product, the key is got, and this key is input in controller is matched, after successful matching, Can make to set up safety chain between smart machine and controller, that is to say, that after completing matching operation using temporary key, intelligence Arrange long term keys between equipment and controller, the data for communicating are encrypted using long term keys.
Because most of wireless smart devices do not have man-machine interface and OOB(Out Of Band), user will obtain temporarily Key can only be by way of Quick Response Code or bar code on product packing box, and this directly increases the complexity of production process And production cost, and easily cause temporary key loss and easily obtained by third party, cause Network Security Vulnerabilities.
Thus prior art could be improved and improve.
The content of the invention
In view of above-mentioned the deficiencies in the prior art part, it is an object of the invention to provide a kind of method for accessing wireless network And system, temporary key is produced by the on-off times of control node equipment, it is produced into without increasing Quick Response Code or bar code etc. This, and temporary key randomness is strong, effectively increase the security of data interaction between smart machine in wireless network.
In order to achieve the above object, this invention takes following technical scheme:
A kind of method for accessing wireless network, it comprises the following steps:
A, controller carry out pairing feature and exchange with node device;
B, prompting user are input into the temporary key produced by the on-off times of control node equipment on the controller;
C, matching checking is carried out according to the temporary key of user input, and generated according to the temporary key after being proved to be successful short Phase key;
D, the encryption connection set up between controller and node device according to the ephemeral keys, complete encryption data interaction.
In the method for described access wireless network, before the step A, or after the step A, before step B Also include step:
Continuously switch several times, is detected and remembered in Preset Time according to the switching control instruction of user input for A0, node device The frequency n of switching manipulation is recorded, the frequency n is saved as into temporary key.
In the method for described access wireless network, the step A0 comprises the following steps:
A01, the power switch of node device are continuously switched several times in Preset Time;
A02, energy-storage module are powered when power switch is closed to node device;
A03, the switching-on and switching-off state of switch detection module detection node equipment simultaneously export corresponding level;
A04, the electrical level judging according to output simultaneously record the frequency n of switching manipulation, and the frequency n is saved as into temporary key.
In the method for described access wireless network, the step A04 is specifically included:
When the low level duration is exported more than very first time threshold value, judge that power switch is closed;When first Output high level then judges that power switch is in opening in time threshold;
It is once effective switching manipulation to switch to unlatching condition adjudgement by closed mode, all effective in record Preset Time The frequency n of switching manipulation, temporary key is saved as by the frequency n.
In the method for described access wireless network, the step A includes step:
A1, controller initiate pairing request to node device, and request carries out pairing feature and exchanges;
A2, node device respond the pairing request after receiving the pairing request, and unique characteristics are returned back into controller.
In the method for described access wireless network, the step B includes step:
B1, controller inputting interface eject input frame, point out user input temporary key;
B2, the temporary key for receiving the on-off times generation by control node equipment that user is input into input frame.
In the method for described access wireless network, the step C includes step:
Controller and node device produce the first random number and the second random number respectively after C1, input temporary key, and according to the First verification value of one preset algorithm computing controller and the second verification value of node device;
C2, controller and node device are exchanged with each other the first verification value and the second verification value;
C3, controller send to node device the first random number, and node device calculates control according to first nonce count Device verification value, and it is whether consistent with the first verification value contrast that controller sends;
C4, when the controller verification value for calculating is consistent with the first verification value, node device sends to control the second random number Device processed, controller calculates node device verification value according to second nonce count, and the second confirmation sent with node device Whether value contrast is consistent;
C5, when the node device verification value for calculating is consistent with the second verification value, according to the temporary key, the first random number Generation ephemeral keys are calculated with the second random number.
In the method for described access wireless network, the step D is specifically included:According to the ephemeral keys to controller Link between node device is encrypted, and completes follow-up long term keys distribution and encryption data interaction.
A kind of system for accessing wireless network, it includes controller and node device, and the controller includes:
Pairing request module, exchanges for carrying out pairing feature with node device;
Prompting input module, for the temporary key for pointing out user input to be produced by the on-off times of control node equipment;
Matching authentication module, matching checking is carried out for the temporary key according to user input, and according to institute after being proved to be successful State temporary key generation ephemeral keys;
Encryption connection module, for the encryption connection set up between controller and node device according to the ephemeral keys, completes Encryption data is interacted.
In the system of described access wireless network, the node device includes:
Detection module is switched, the switching-on and switching-off state for detection node equipment simultaneously exports corresponding level;
Main control module, for the electrical level judging according to output and records the frequency n of switching manipulation, the frequency n is saved as and is faced When key;
Energy-storage module, for being powered to node device when power switch is closed;
Wireless module, for carrying out data interaction with controller.
Compared to prior art, in the method and system of the access wireless network that the present invention is provided, the access wireless network The method of network carries out pairing feature and exchanges by controller and node device;Prompting user is input into by controlling to save on the controller The temporary key that the on-off times of point device are produced;The temporary key according to user input carries out matching checking afterwards, and is testing Ephemeral keys are generated according to the temporary key after demonstrate,proving successfully;Afterwards controller and node device are set up according to the ephemeral keys Between encryption connection, complete encryption data interaction, temporary key is produced by the on-off times of control node equipment, without increasing Plus the production cost such as Quick Response Code or bar code, and temporary key randomness is strong, effectively increase in wireless network between smart machine The security of data interaction.
Brief description of the drawings
The flow chart of the method for the access wireless network that Fig. 1 is provided for the present invention.
The flow chart of step S100 in the method for the access wireless network that Fig. 2 is provided for the present invention.
The circuit diagram of the switch detection module used in the method for the access wireless network that Fig. 3 is provided for the present invention.
It is the input voltage for switching detection module that is used in the method for access wireless network that Fig. 4 is provided for the present invention, defeated Go out voltage and output level schematic diagram.
The flow chart of step S30 in the method for the access wireless network that Fig. 5 is provided for the present invention.
The structured flowchart of controller in the system of the access wireless network that Fig. 6 is provided for the present invention.
The structured flowchart of the system interior joint equipment of the access wireless network that Fig. 7 is provided for the present invention.
Specific embodiment
In view of generally needing to obtain temporary key by Quick Response Code in product packaging or bar code in the prior art, increase life The shortcomings of into cost, it is an object of the invention to provide a kind of method and system for accessing wireless network, set by control node Standby on-off times produce temporary key, without increasing the production costs such as Quick Response Code or bar code, and temporary key randomness it is strong, Effectively increase the security of data interaction between smart machine in wireless network.
To make the purpose of the present invention, technical scheme and effect clearer, clear and definite, develop simultaneously embodiment pair referring to the drawings The present invention is further described.It should be appreciated that specific embodiment described herein is only used to explain the present invention, it is not used to Limit the present invention.
Fig. 1 is referred to, the method for the access wireless network that the present invention is provided comprises the following steps:
S10, controller carry out pairing feature and exchange with node device;
S20, prompting user are input into the temporary key produced by the on-off times of control node equipment on the controller;
S30, matching checking is carried out according to the temporary key of user input, and generated according to the temporary key after being proved to be successful Ephemeral keys;
S40, the encryption connection set up between controller and node device according to the ephemeral keys, complete encryption data interaction.
In step S10, a controller and several intelligent node equipment are included in wireless network, when controller is detected One new node device need to be added in network, then controller and node device carry out pairing feature and exchange, to exchange IO energy Power, OOB authentication datas availability, certification demand, cipher key size demand and the transmission specific key that will be distributed.
Specifically, the step S10 includes step:
S11, controller initiate pairing request to node device, and request carries out pairing feature and exchanges;
S12, node device respond the pairing request after receiving the pairing request, and unique characteristics are returned back into controller.
When controller detects a new node device need to be added in network, controller is initiated to node device Pairing_Request pairing requests, request pairing feature is exchanged, i.e., security feature is exchanged, including input/output(IO)Work( Energy, OOB(Out-of-Band, band is outer)Data Labels position, binding mark(Bonding Flags)、MITM(Man-In-The- Middle)Flag bit and cipher key size etc., node device respond the pairing request after receiving the pairing request, will Unique characteristics are replied(pairing_Response)To controller, match characteristic and exchanged allowing the controller and node of connection Equipment both sides learn mutual pairing characteristic, are easy to follow-up pairing to connect.
Further, the step S20 includes step:
S21, controller inputting interface eject input frame, point out user input temporary key;
S22, the temporary key for receiving the on-off times generation by control node equipment that user is input into input frame.
I.e. after controller and node device completion pairing feature are exchanged, will be ejected in the inputting interface of controller and be input into Frame, to point out user input temporary key, user is input into input frame and is produced by the on-off times of advance control node equipment Raw random temporary key, randomness is strong, improves the security of data interaction.
Because the temporary key is to be produced beforehand through the on-off times of control node equipment, therefore before step S10, Or also include step after step S10, before step S20:
Continuously switch several times, is detected simultaneously in Preset Time according to the switching control instruction of user input for S100, node device The frequency n of switching manipulation is recorded, the frequency n is saved as into temporary key.
The present invention is by the way that before user input temporary key, user is by controlling wireless intelligent network interior joint equipment Power switch randomly generates a temporary key(TK), quickly continuously switch the node device several times in Preset Time, High-speed switch node device 5 times for example in 10s, the high-speed switch node device produces the process of random temporary key can be Any one stage in three phases performs, i.e. before step S11 or between step S11 and step S12 or step S12 Between step S21, now node device is detected and records the frequency n of switching manipulation, and the frequency n is saved as interim close Key is used for follow-up checking and matches.
Specifically also referring to Fig. 2, the step S100 comprises the following steps:
S101, the power switch of node device are continuously switched several times in Preset Time;
S102, energy-storage module are powered when power switch is closed to node device;
S103, the switching-on and switching-off state of switch detection module detection node equipment simultaneously export corresponding level;
S104, the electrical level judging according to output simultaneously record the frequency n of switching manipulation, and the frequency n is saved as into temporary key.
Node device of the present invention quickly continuously switchs some according to the switching control instruction of user input in Preset Time It is secondary, acted using switch detection module detection switch as shown in Figure 3, i.e., the switching-on and switching-off state of detection node equipment and export Corresponding level, detailed process is that alternating current carries out rectification treatment output dc source by rectifier bridge, and the voltage of output is through undue The Vs produced after piezoresistance first resistor R1 and second resistance R2 partial pressures is input into the in-phase input end of comparator, with anti-phase input Hold the reference voltage Vref of input to be compared, high level is exported when Vs is more than Vref, otherwise export low level, therefore master control Module is according to the electrical level judging of output and records the frequency n of switching manipulation, and the frequency n is saved as into temporary key afterwards, from And produce the strong temporary key of randomness, it is preferable that when of short duration power switch is closed, supplied to node device by energy-storage module Electricity, for example inductively or capacitively etc., it is to avoid the damage that continuous high-speed switch power supply is caused to node device.
Wherein, the step S104 is specifically included:
When the low level duration is exported more than very first time threshold value, judge that power switch is closed;When first Output high level then judges that power switch is in opening in time threshold;
It is once effective switching manipulation to switch to unlatching condition adjudgement by closed mode, all effective in record Preset Time The frequency n of switching manipulation, temporary key is saved as by the frequency n.
Be can be seen that with reference to Fig. 4, comparator is output as cycle level signal in the case of normal power supply, its cycle T rec is two / mono- ac period Tac, after power switch is closed, does not have alternating current to be input into, and comparator output is always low level, If main control module detects the comparator output low level time more than very first time threshold value, represent now power switch and exist Closed mode;If the output level for detecting comparator high level occurs in very first time threshold value, represent and now first open Close and be in opening, it is once effective switching manipulation, main control module record to switch to unlatching condition adjudgement by closed mode The frequency n of all effective switching manipulations, temporary key is saved as by the frequency n in Preset Time, is set by control node Standby on-off times produce temporary key, without increasing the production costs such as Quick Response Code or bar code, and temporary key randomness it is strong, Effectively increase the security of data interaction between smart machine in wireless network.
Further, also referring to Fig. 5, the step S30 includes step:
Controller and node device produce the first random number and the second random number respectively after S31, input temporary key, and according to the First verification value of one preset algorithm computing controller and the second verification value of node device;
S32, controller and node device are exchanged with each other the first verification value and the second verification value;
S33, controller send to node device the first random number, and node device calculates control according to first nonce count Device verification value, and it is whether consistent with the first verification value contrast that controller sends;
S34, when the controller verification value for calculating is consistent with the first verification value, node device sends to control the second random number Device processed, controller calculates node device verification value according to second nonce count, and the second confirmation sent with node device Whether value contrast is consistent;
S35, when the node device verification value for calculating is consistent with the second verification value, according to the temporary key, first random Number and the second random number calculate generation ephemeral keys.
In the method for the access wireless network that i.e. present invention is provided, user have input temporary key(TK)To carry out afterwards Matching checking, and ephemeral keys are generated according to the temporary key after being proved to be successful, detailed process is:Controller and node device The first random number is produced respectively(Mrand)With the second random number(Srand), and respective confirmation is calculated according to the first preset algorithm (confirm)Value, i.e. the first verification value of controller(Mconfirm)With the second verification value of node device(Sconfirm), Confirm values are by temporary key(TK), the two random number Mrand/Srand, pairing request instruction(Pairing request command), pairing response instruction(Pairing response command), device address type(device address type)And device address(device address)Produced by the first preset algorithm, first preset algorithm can be confirmation Value generating function(Specifically refer to the version of bluetooth core specification 4.2, volume 4, H parts, 2.2.3 chapters and sections), because it is existing There is technology, be not described further herein;Controller and node device are exchanged with each other the first verification value and the second verification value afterwards;Control afterwards The the first random number Mrand of itself is sent to node device by device processed, and node device calculates controller after receiving using the value Mconfirm values, and be relatively consistent with the Mconfirm that foregoing controller sends, if unanimously, node device by itself The second random number Srand be sent to controller, controller calculates the Sconfirm values of node device using the value after receiving, And with the Sconfirm that preceding node equipment sends relatively be it is consistent, if it is same it is consistent if be proved to be successful, according to described interim Key, the first random number and the second random number calculate generation ephemeral keys(STK), and notification controller encryption enabled, specific institute Ephemeral keys are stated to be generated by key-function(Refer to the version of bluetooth core specification 4.2, volume 2, H parts, 2.2.4 Chapters and sections), because it is prior art, it is not described further herein.
After matching is proved to be successful and obtains ephemeral keys, you can in step s 40 according to the ephemeral keys to control Link between device and node device is encrypted, and completes follow-up long term keys distribution and encryption data interaction, it is ensured that Equipment carries out the security of data interaction in network.
The present invention correspondingly provides a kind of system for accessing wireless network, including controller and node device, such as Fig. 6 and Tu Shown in 7, the controller includes pairing request module 11, prompting input module 12, matching authentication module 13 and encryption connection mould Block 14, the pairing request module 11, prompting input module 12, matching authentication module 13 and encryption connection module 14 connect successively Connect, wherein, the pairing request module 11 is exchanged for carrying out pairing feature with node device;The prompting input module 12 is used In the temporary key that prompting user input is produced by the on-off times of control node equipment;The matching authentication module 13 is used for Temporary key according to user input carries out matching checking, and short-term close according to temporary key generation after being proved to be successful Key;The encryption connection module 14 is used for the encryption connection set up between controller and node device according to the ephemeral keys, Complete encryption data interaction.Specifically refer to the corresponding embodiment of the above method.
The node device includes switch detection module 21, main control module 22, energy-storage module 23 and wireless module 24, described Switch detection module 21 and energy-storage module 23 are all connected with main control module 22, and the main control module 22 is also connected with wireless module 24, its In, the switch detection module 21 is used for the switching-on and switching-off state of detection node equipment and exports corresponding level;The master control mould Block 22 is used for the electrical level judging according to output and records the frequency n of switching manipulation, and the frequency n is saved as into temporary key;Institute Energy-storage module 23 is stated for being powered to node device when power switch is closed;The wireless module 24 is used to be carried out with controller Data interaction, such as bluetooth or wifi etc..
Specifically, referring to Fig. 3, the switch detection module 21 includes rectifier bridge 211, first resistor R1, second Resistance R2, the first power supply U1 and comparator A1, the input connection alternating voltage of the rectifier bridge 211, the rectifier bridge 211 Positive output end connects the in-phase input end of comparator A1 and one end of second resistance R2 by first resistor R1;First power supply The inverting input of the positive pole connection comparator A1 of U1, the output end connection main control module 22 of the comparator A1;The rectification The negative pole of the negative output terminal, the other end of second resistance R2 and the first power supply U1 of bridge 211 is grounded.Specifically refer to the above method Corresponding embodiment.
To more fully understand the implementation process of the method for the access wireless network that the present invention is provided, below in conjunction with Fig. 1 to figure 5, data exchange process of the invention is described in detail for concrete application embodiment:
For example having a blue-tooth intelligence LED A need to add the blue-tooth intelligence network of mobile phone control, and pairing process is as follows:
1st, mobile phone initiates pairing_Request to LED A, and request pairing feature is exchanged;For exchanging IO abilities, OOB certifications Availability of data, certification demand, cipher key size demand and the transmission specific key that will be distributed;
2nd, after LED A receives mobile phone pairing_Request, unique characteristics are replied(pairing_Response)To mobile phone;
3rd, mobile phone prompting user is input into temporary key in input frame;
3.1st, the power switch of high-speed switch LED A, the automatically action of power switch detection module detection switch and record switch Frequency n(It should be noted that, the step can also be performed before step 1 or 2);
3.2nd, user is input into n and confirms in the temporary key input frame of mobile phone;
4th, mobile phone and LED A produce respective random number(Mrand and Srand)Afterwards, respective confirm values are calculated (Mconfirm and Sconfirm), specific computation rule refers to above method embodiment;
5th, the Mrand of itself is issued LED A by mobile phone after both sides exchange respective confirm values, and LED A is utilized after receiving should Value calculates the Mconfirm values of mobile phone, and is relatively consistent with the Mconfirm that previous mobile phone sends;
6th, the Srand of oneself is issued mobile phone by LED A, and mobile phone calculates the Sconfirm values of LED A using the value after receiving, And with the Sconfirm that previous LED A sends relatively be consistent;
7th, ephemeral keys STK is generated according to TK, Mrand and Srand after the match is successful;
8th, link is encrypted with STK and completes follow-up long term keys(LTK)Distribution.
In sum, in the method and system of the access wireless network that the present invention is provided, the side for accessing wireless network Method carries out pairing feature and exchanges by controller and node device;Prompting user is input into by control node equipment on the controller On-off times produce temporary key;The temporary key according to user input carries out matching checking afterwards, and is being proved to be successful Ephemeral keys are generated according to the temporary key afterwards;Set up between controller and node device according to the ephemeral keys afterwards Encryption connection, completes encryption data interaction, temporary key is produced by the on-off times of control node equipment, without increasing two dimension The production cost such as code or bar code, and temporary key randomness is strong, effectively increase data friendship between smart machine in wireless network Mutual security.
It is understood that for those of ordinary skills, can be with technology according to the present invention scheme and its hair Bright design is subject to equivalent or change, and all these changes or replacement should all belong to the guarantor of appended claims of the invention Shield scope.

Claims (10)

1. it is a kind of access wireless network method, it is characterised in that comprise the following steps:
A, controller carry out pairing feature and exchange with node device;
B, prompting user are input into the temporary key produced by the on-off times of control node equipment on the controller;
C, matching checking is carried out according to the temporary key of user input, and generated according to the temporary key after being proved to be successful short Phase key;
D, the encryption connection set up between controller and node device according to the ephemeral keys, complete encryption data interaction.
2. it is according to claim 1 access wireless network method, it is characterised in that it is before the step A or described Also include step after step A, before step B:
Continuously switch several times, is detected and remembered in Preset Time according to the switching control instruction of user input for A0, node device The frequency n of switching manipulation is recorded, the frequency n is saved as into temporary key.
3. the method for accessing wireless network according to claim 2, it is characterised in that the step A0 includes following step Suddenly:
A01, the power switch of node device are continuously switched several times in Preset Time;
A02, energy-storage module are powered when power switch is closed to node device;
A03, the switching-on and switching-off state of switch detection module detection node equipment simultaneously export corresponding level;
A04, the electrical level judging according to output simultaneously record the frequency n of switching manipulation, and the frequency n is saved as into temporary key.
4. it is according to claim 3 access wireless network method, it is characterised in that the step A04 is specifically included:
When the low level duration is exported more than very first time threshold value, judge that power switch is closed;When first Output high level then judges that power switch is in opening in time threshold;
It is once effective switching manipulation to switch to unlatching condition adjudgement by closed mode, all effective in record Preset Time The frequency n of switching manipulation, temporary key is saved as by the frequency n.
5. it is according to claim 1 access wireless network method, it is characterised in that the step A include step:
A1, controller initiate pairing request to node device, and request carries out pairing feature and exchanges;
A2, node device respond the pairing request after receiving the pairing request, and unique characteristics are returned back into controller.
6. it is according to claim 1 access wireless network method, it is characterised in that the step B include step:
B1, controller inputting interface eject input frame, point out user input temporary key;
B2, the temporary key for receiving the on-off times generation by control node equipment that user is input into input frame.
7. it is according to claim 1 access wireless network method, it is characterised in that the step C include step:
Controller and node device produce the first random number and the second random number respectively after C1, input temporary key, and according to the First verification value of one preset algorithm computing controller and the second verification value of node device;
C2, controller and node device are exchanged with each other the first verification value and the second verification value;
C3, controller send to node device the first random number, and node device calculates control according to first nonce count Device verification value, and it is whether consistent with the first verification value contrast that controller sends;
C4, when the controller verification value for calculating is consistent with the first verification value, node device sends to control the second random number Device processed, controller calculates node device verification value according to second nonce count, and the second confirmation sent with node device Whether value contrast is consistent;
C5, when the node device verification value for calculating is consistent with the second verification value, according to the temporary key, the first random number Generation ephemeral keys are calculated with the second random number.
8. it is according to claim 1 access wireless network method, it is characterised in that the step D is specifically included:According to The ephemeral keys are encrypted to the link between controller and node device, and complete follow-up long term keys distribution and Encryption data is interacted.
9. it is a kind of access wireless network system, it is characterised in that including controller and node device, the controller includes:
Pairing request module, exchanges for carrying out pairing feature with node device;
Prompting input module, for the temporary key for pointing out user input to be produced by the on-off times of control node equipment;
Matching authentication module, matching checking is carried out for the temporary key according to user input, and according to institute after being proved to be successful State temporary key generation ephemeral keys;
Encryption connection module, for the encryption connection set up between controller and node device according to the ephemeral keys, completes Encryption data is interacted.
10. it is according to claim 9 access wireless network system, it is characterised in that the node device includes:
Detection module is switched, the switching-on and switching-off state for detection node equipment simultaneously exports corresponding level;
Main control module, for the electrical level judging according to output and records the frequency n of switching manipulation, the frequency n is saved as and is faced When key;
Energy-storage module, for being powered to node device when power switch is closed;
Wireless module, for carrying out data interaction with controller.
CN201710221072.2A 2017-04-06 2017-04-06 Method and system for accessing wireless network Active CN106937406B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710221072.2A CN106937406B (en) 2017-04-06 2017-04-06 Method and system for accessing wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710221072.2A CN106937406B (en) 2017-04-06 2017-04-06 Method and system for accessing wireless network

Publications (2)

Publication Number Publication Date
CN106937406A true CN106937406A (en) 2017-07-07
CN106937406B CN106937406B (en) 2019-12-17

Family

ID=59426230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710221072.2A Active CN106937406B (en) 2017-04-06 2017-04-06 Method and system for accessing wireless network

Country Status (1)

Country Link
CN (1) CN106937406B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833607A (en) * 2018-06-12 2018-11-16 腾讯科技(深圳)有限公司 Physical address acquisition methods, device and readable medium
CN109714765A (en) * 2019-01-25 2019-05-03 欧普照明股份有限公司 A kind of matching method
CN111263360A (en) * 2020-03-17 2020-06-09 中国工程物理研究院机械制造工艺研究所 Wireless encryption device and method for protecting variable mechanical authentication password by adopting public key
WO2021258376A1 (en) * 2020-06-24 2021-12-30 Oppo广东移动通信有限公司 Wireless communication method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070252675A1 (en) * 2004-09-24 2007-11-01 David Lamar Electronically enabling device remotely
CN101118662A (en) * 2006-08-02 2008-02-06 雅马哈发动机株式会社 Vehicle control device and vehicle provided with the same
US20080224819A1 (en) * 2007-03-16 2008-09-18 The Chamberlain Group, Inc. Multiple barrier operator system
CN202503698U (en) * 2012-01-31 2012-10-24 雷通科技发展有限公司 Intelligent LED lights
CN104533185A (en) * 2015-01-23 2015-04-22 魏初舜 Collecting system based on code case
CN104955241A (en) * 2015-07-08 2015-09-30 乐鑫信息科技(上海)有限公司 Method and device for pairing lighting equipment and switches without wires in IoT (Internet of Things)
CN105303118A (en) * 2015-11-26 2016-02-03 上海易码信息科技有限公司 Encryption method and encryption device used for wearable device
CN105847038A (en) * 2016-03-17 2016-08-10 深圳市彩易生活科技有限公司 Wireless communication module, reset method for terminal equipment and control system
CN105844133A (en) * 2016-03-18 2016-08-10 广东欧珀移动通信有限公司 Application opening method and system
CN106143412A (en) * 2015-03-26 2016-11-23 比亚迪股份有限公司 Automobile, the wireless key system of automobile and control method thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070252675A1 (en) * 2004-09-24 2007-11-01 David Lamar Electronically enabling device remotely
CN101118662A (en) * 2006-08-02 2008-02-06 雅马哈发动机株式会社 Vehicle control device and vehicle provided with the same
US20080224819A1 (en) * 2007-03-16 2008-09-18 The Chamberlain Group, Inc. Multiple barrier operator system
CN202503698U (en) * 2012-01-31 2012-10-24 雷通科技发展有限公司 Intelligent LED lights
CN104533185A (en) * 2015-01-23 2015-04-22 魏初舜 Collecting system based on code case
CN106143412A (en) * 2015-03-26 2016-11-23 比亚迪股份有限公司 Automobile, the wireless key system of automobile and control method thereof
CN104955241A (en) * 2015-07-08 2015-09-30 乐鑫信息科技(上海)有限公司 Method and device for pairing lighting equipment and switches without wires in IoT (Internet of Things)
CN105303118A (en) * 2015-11-26 2016-02-03 上海易码信息科技有限公司 Encryption method and encryption device used for wearable device
CN105847038A (en) * 2016-03-17 2016-08-10 深圳市彩易生活科技有限公司 Wireless communication module, reset method for terminal equipment and control system
CN105844133A (en) * 2016-03-18 2016-08-10 广东欧珀移动通信有限公司 Application opening method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833607A (en) * 2018-06-12 2018-11-16 腾讯科技(深圳)有限公司 Physical address acquisition methods, device and readable medium
CN109714765A (en) * 2019-01-25 2019-05-03 欧普照明股份有限公司 A kind of matching method
CN111263360A (en) * 2020-03-17 2020-06-09 中国工程物理研究院机械制造工艺研究所 Wireless encryption device and method for protecting variable mechanical authentication password by adopting public key
WO2021258376A1 (en) * 2020-06-24 2021-12-30 Oppo广东移动通信有限公司 Wireless communication method and device

Also Published As

Publication number Publication date
CN106937406B (en) 2019-12-17

Similar Documents

Publication Publication Date Title
CN106937406A (en) A kind of method and system for accessing wireless network
EP2829095B1 (en) Network security configuration using short-range wireless communication
CN103929748A (en) Internet of things wireless terminal, configuration method thereof and wireless network access point
CN103095460B (en) Intelligent card safety communication method
CN108270554B (en) Terminal pairing method and system
CN107769914A (en) Protect the method and the network equipment of data transmission security
CN104486759A (en) Method accessing wireless network without obstacle
CN103838988B (en) Information safety protecting method and device
CN108768628B (en) Equipment end encryption method, device, system and gateway
CN107483184A (en) Battery management method, equipment, battery, article and system
CN105681032A (en) Key storage method and device as well as key management method and device
CN104184857A (en) Intelligent separated SIM card clamping base device and communication method
CN103476028A (en) NAS (Non Access Stratum) message treatment method and device during rollover of NAS COUNT
CN105376059A (en) Method and system for performing application signature based on electronic key
CN104159259A (en) A wireless communication method and a wireless communication apparatus
CN106465044A (en) Wireless power transfer with improved device identification and signaling link security
CN115225339B (en) Safe access and data transmission method and system for sensing terminal of power transmission Internet of things
CN109561413A (en) A kind of the bluetooth authentication authorization method and authoring system of BLE equipment
CN104244373B (en) A kind of method that wireless terminal adds wireless network
EP2863578B1 (en) Network device and authentication thereof and key management method
CN103702323A (en) Wireless information security equipment system and method
CN105491553A (en) Virtual SIM/USIM card management method
CN102158856A (en) Mobile terminal identification code authentication system and method, server and terminal
CN103441854A (en) Link protection method and system
CN106411513B (en) Cryptographic key negotiation method and device in local area network communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant